{"id":53207,"date":"2023-08-11T12:00:00","date_gmt":"2023-08-11T12:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/dr-tech\/mobb-wins-black-hat-startup-spotlight-competition"},"modified":"2023-08-11T12:00:00","modified_gmt":"2023-08-11T12:00:00","slug":"mobb-wins-black-hat-startup-spotlight-competition","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/","title":{"rendered":"Mobb Wins Black Hat Startup Spotlight Competition"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd91dd42bda724bd7\/64d691e6b8914718dfd1ca7e\/mobbwinner-Brittany_Buza-bhusa2023.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>BLACK HAT USA \u2013 Las Vegas \u2013 Wednesday, Aug. 9<\/strong> Vulnerability remediation startup Mobb won the <a href=\"https:\/\/www.blackhat.com\/us-23\/spotlight.html\" target=\"_blank\" rel=\"noopener\">Startup Spotlight competition<\/a> at Black Hat USA 2023, beating out others focused on firmware security, cloud infrastructure security, and software security.<\/p>\n<p>The four finalists \u2013 <a href=\"https:\/\/www.darkreading.com\/dr-tech\/startup-spotlight-binarly-hardens-firmware-security\" target=\"_blank\" rel=\"noopener\">Binarly<\/a>, <a href=\"https:\/\/www.darkreading.com\/dr-tech\/startup-spotlight-endor-labs-focuses-on-reachability\" target=\"_blank\" rel=\"noopener\">Endor Labs<\/a>, <a href=\"https:\/\/www.darkreading.com\/dr-tech\/startup-spotlight-gomboc-ai-balances-cloud-infrastructure-security\" target=\"_blank\" rel=\"noopener\">Gomboc.ai<\/a>, and <a href=\"https:\/\/www.darkreading.com\/dr-tech\/startup-spotlight-mobb-aims-to-be-the-fixer\" target=\"_blank\" rel=\"noopener\">Mobb<\/a> \u2013 were selected after a video pitch competition in June. Each one received booth space in the Black Hat Business Hall, a consultation with an Omdia analyst, and the opportunity&nbsp;to make a 10-minute presentation during the conference at the Startup City theater in front of the judges. To be considered for the competition, companies had to be less than 2 years old and have fewer than 50 employees. &nbsp;<\/p>\n<p>After the presentations, the panel of judges asked three to four questions to clarify some points they felt had not been addressed in the pitches. The judges were Ketaki Borade, senior analyst in Omdia&#8217;s infrastructure security research practice; Trey Ford, deputy CISO at Vista Consulting Group; Hollie Hennessy, senior analyst in Omdia&#8217;s IoT cybersecurity practice; Lucas Nelson, founding partner at Lytical Ventures; and Robert J. Stratton III, principal and strategist at Polymathics and venture partner at Nextgen Venture Partners.<\/p>\n<p>&#8220;In the startup market, sometimes companies are trying to do too much, but Mobb was confident about its capabilities,&#8221; <span>Hennessy <\/span>says. &#8220;One of the real challenges of cybersecurity is to bring together different parts of the business \u2013 in this case, developers and security. Mobb&#8217;s product bridges that gap, improves security, and increases productivity.&#8221;<\/p>\n<p>Artificial intelligence (AI) was a common thread throughout all of the presentations. Some startups were very upfront about their use of AI (&#8220;Gomboc.ai, the AI is in our name,&#8221; Amit told the judges), while others touched on their AI use when explaining their technology capabilities.<\/p>\n<p>&#8220;In reality, most cybersecurity companies are using AI to some extent, [but] now we&#8217;re hearing about the intricacies of it more given the current hype,&#8221; Hennessy says. &#8220;I think it showcases the value of AI in the latest cybersecurity solutions, and I&#8217;m interested to see how we continue to see innovation in this space.&#8221;<\/p>\n<h2>Finalists Pitch the Judges<\/h2>\n<p>Alex Matrosov, CEO and founder of Binarly, laid out his case for firmware security, noting that if the firmware is broken, &#8220;everything else is compromised.&#8221; Firmware issues require an ecosystem approach because the vulnerability exists in every device that uses that vulnerable component. Binarly created a binary-analysis tool that finds known and unknown vulnerabilities in firmware and works with device manufacturers, such as Dell, vendors making the components, and enterprises looking for transparency in their environments. According to Matrosov, it can take 171 days for firmware vulnerabilities to be fixed.<\/p>\n<p>&#8220;Focusing on firmware security as a first point of call is a necessary approach for device protection, and it&#8217;s promising that Binarly is seeing interest from across the ecosystems of operators, makers, and firmware developers,&#8221; Hennessy <span>says<\/span>.<\/p>\n<p>Varun Badhwar, CEO and co-founder Endor Labs, focused on open source code security <span>\u2013 <\/span>about helping developers make better choices with code and fixing vulnerabilities in open source components. Badhwar referred to the &#8220;developer productivity tax&#8221; \u2013 the amount of time developers spend investigating vulnerability reports to identify what they need to fix. While 80% to 90% of modern software development may consist of open source components, Badhwar says just 12% of the code is actually used in the code. So a vulnerability in a function in the open source library that is not being used in the application may not be as high of a priority to fix. <\/p>\n<p>Endor Labs also has a recommendation engine to help developers make better decisions about which libraries and components to use, since there will be fewer issues to fix if the package itself has been vetted for vulnerable code.<\/p>\n<p>Endor Labs \u2013 also an Innovation Sandbox finalist at this year&#8217;s RSA Conference \u2013 was voted the audience favorite.<\/p>\n<p>&#8220;What I liked was they are paying attention to the open source code security,&#8221; says Omdia&#8217;s Borade. &#8220;I see them getting acquired by the big fishes who struggle to grow organically in this domain.&#8221;<\/p>\n<p>Ian Amit, CEO and co-founder of Gomboc.ai, focused on remediating cloud infrastructure issues, noting that it was not possible for security engineers to learn every possible configuration across every cloud environment.<\/p>\n<p>Gomboc.ai was founded by cloud infrastructure veterans; Amit and his co-founder are both former Amazon Web engineers. Gomboc.ai has human analysts define security policies and uses AI to apply those policies. Security teams use regular language to define policy, such as &#8220;public-facing assets can&#8217;t be written to.&#8221; The AI engine identifies the code required to turn that policy into the proper cloud configuration. <\/p>\n<p>&#8220;Humans are good at saying what they want,&#8221; Amit said. &#8220;AI is good at finding solutions.&#8221;<\/p>\n<p>Gomboc.ai relies on deterministic AI, not generative AI. Generative AI can give different answers each time, while deterministic AI will always give the same answer every time for the same set of inputs, which is important when trying to address vulnerabilities and apply policy.<\/p>\n<p>Eitan Worcel, CEO and co-founder of Mobb, focused on how to save organizations money using the following illustration: A vulnerability report may list four issues, but three of them may not be exploitable. It may take a developer 30 minutes to investigate the report to identify which of the issues need attention and 15 minutes to open a ticket with all of the relevant information. It may take four hours to actually fix the issue. If the organization spends $200 an hour for the developer&#8217;s time, that is about $1,000 being spent \u2013 and organizations have thousands of issues.<\/p>\n<p>Mobb accepts vulnerability-scanning reports from a range of static application security testing (SAST) tools and assigns a confidence score to various parts of the code. Mobb provides recommendations based on best practices on how to fix those issues. When the developer accepts the recommendation, Mobb then applies the fix, Worcel says. The company currently supports Java, Node.js, and .NET support is on the way.<\/p>\n<p>&#8220;[<span>Mobb] <\/span>made a good case of how they will save money for the organizations,&#8221; Borade says, noting that one of the findings from the Omdia Decision Maker Survey 2023 was that high costs were among the top three cloud security challenges for enterprises. &#8220;Mobb had a very straightforward answer about how it will solve part of the vulnerability remediation issue and save time for developers.&#8221;<\/p>\n<p>Three of the finalists \u2013 Endor Labs, Gomboc.ai, and Mobb \u2013 touched on vulnerability prioritization and their approaches for helping security teams understand which issues were the most pressing. Software security is obviously an area of high interest in the startup ecosystem \u2013 last year&#8217;s winner, <a href=\"https:\/\/www.darkreading.com\/risk\/supply-chain-security-startup-phylum-wins-the-first-black-hat-innovation-spotlight\">Phylum<\/a>, was also a software security startup.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/mobb-wins-black-hat-startup-spotlight-competition\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The four finalists tackled firmware security, cloud infrastructure, open source software, and vulnerability remediation.Read More <a href=\"https:\/\/www.darkreading.com\/dr-tech\/mobb-wins-black-hat-startup-spotlight-competition\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-53207","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobb Wins Black Hat Startup Spotlight Competition 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobb Wins Black Hat Startup Spotlight Competition 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-11T12:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd91dd42bda724bd7\/64d691e6b8914718dfd1ca7e\/mobbwinner-Brittany_Buza-bhusa2023.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Mobb Wins Black Hat Startup Spotlight Competition\",\"datePublished\":\"2023-08-11T12:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/\"},\"wordCount\":1119,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd91dd42bda724bd7\\\/64d691e6b8914718dfd1ca7e\\\/mobbwinner-Brittany_Buza-bhusa2023.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/\",\"name\":\"Mobb Wins Black Hat Startup Spotlight Competition 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd91dd42bda724bd7\\\/64d691e6b8914718dfd1ca7e\\\/mobbwinner-Brittany_Buza-bhusa2023.jpg\",\"datePublished\":\"2023-08-11T12:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd91dd42bda724bd7\\\/64d691e6b8914718dfd1ca7e\\\/mobbwinner-Brittany_Buza-bhusa2023.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/bltd91dd42bda724bd7\\\/64d691e6b8914718dfd1ca7e\\\/mobbwinner-Brittany_Buza-bhusa2023.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobb-wins-black-hat-startup-spotlight-competition\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobb Wins Black Hat Startup Spotlight Competition\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobb Wins Black Hat Startup Spotlight Competition 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/","og_locale":"en_US","og_type":"article","og_title":"Mobb Wins Black Hat Startup Spotlight Competition 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-11T12:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd91dd42bda724bd7\/64d691e6b8914718dfd1ca7e\/mobbwinner-Brittany_Buza-bhusa2023.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Mobb Wins Black Hat Startup Spotlight Competition","datePublished":"2023-08-11T12:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/"},"wordCount":1119,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd91dd42bda724bd7\/64d691e6b8914718dfd1ca7e\/mobbwinner-Brittany_Buza-bhusa2023.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/","url":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/","name":"Mobb Wins Black Hat Startup Spotlight Competition 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd91dd42bda724bd7\/64d691e6b8914718dfd1ca7e\/mobbwinner-Brittany_Buza-bhusa2023.jpg","datePublished":"2023-08-11T12:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd91dd42bda724bd7\/64d691e6b8914718dfd1ca7e\/mobbwinner-Brittany_Buza-bhusa2023.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltd91dd42bda724bd7\/64d691e6b8914718dfd1ca7e\/mobbwinner-Brittany_Buza-bhusa2023.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mobb-wins-black-hat-startup-spotlight-competition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Mobb Wins Black Hat Startup Spotlight Competition"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53207"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53207\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}